How will you know if someone is using video chat?

How will you know if someone is using video chat? Does the green camera indicator turns red?

Hi,
You Buddy List will show two types of AV icons.
"Single" type which indicates the person can only do 1-1 Chats.
"Stacked" icons indicating they can do Multi-way chats.
Example pic
If they appear feint or "greyed out",  so to speak, then they are Busy to someone else.
(if they are chatting with you they will appear dark again once connected)
9:01 PM      Tuesday; November 15, 2011
Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"
 G4/1GhzDual MDD (Leopard 10.5.8)
 MacBookPro 2Gb( 10.6.8)
 Mac OS X (10.6.8),
"Limit the Logs to the Bits above Binary Images."  No, Seriously

Similar Messages

  • How do you know what classes to use ?

    Hello,
    This may sound daft - but how do you know what classes to use to do a particular task ? For example to do password-related stuff - how would I know which classes are all relevant to that ? Am I supposed to buy a book on the classes as the API documentation doesn't really tell you WHEN to use which classes.

    If you're using JSP, then your password field is likely going to be implemented in HTML. So that's nothing to do with Java. (And you can't use a JPassword field in a JSP page.) But when that field comes back to your server, you may be using Java to authenticate it. Even there, the question is not yet what Java method you are going to use, but what methodology. You could have a database to authenticate against, or an LDAP directory. Or you could have the web server use its built-in authentication, which means you don't have to do any Java coding at all. And there are other ways.
    So the question before yours is, how do you know what methodology to use? Again, that comes down to experience.

  • After RAC installation how will i know that DHCP was used ?

    Once the RAC database is installed .
    how a  new Admin will know that DHCP was used during installation ot not used ?

    DHCP for the database server? Normally one wouldn't use DHCP for a server unless the registration is leased so that the IP address doesn't change. In that case, does it matter if DHCP is used or not? The best way for me to know if the server is *currently* using DHCP is to check the NIC config on the server. But I know of now way to know if the server was using DHCP when RAC was installed.
    Cheers,
    Brian

  • How do you know if someone who has stolen your ipod has restored it

    I recently left my iPod at work, and my manager who found it looked after it and kept it in the office. When I asked another manager the next day where my iPod was she couldn't find it in the office. After a week of waiting both the original Manager who found my iPod didn't know where it was and they said it was misplaced somewhere in the office.
    Today (over a month since I lost it) they said that someone could've possibly stolen it because they couldn't find it in the office.
    For the first week or so my friends have tried iMessaging me and the messages haven't delivered, which was normal. It was as if I still had my iPod but not in wifi range.
    Over a month later, I asked them to iMessage me again and see what it says and they were then prompted that it says "Message Delivery Failed"
    Does this mean someone has restored my iPod? Or is this normal when an iPod hasn't been charged and used for over a month?

    If you have already configured the iCloud Find My iPhone service on your iPhone, iPad, iPod touch, or Mac you can use it to locate your missing device, display a message on its screen, make it play a sound at full volume (even if on mute), remotely lock it, or remotely wipe (erase) it to protect your privacy. Requries iOS 6 to be trackable.
    You can use the Find My iPhone app on a different iOS device (running iOS 5 or better)
    You can use the Find My iPhone app on icloud.com
    You device may NOT be tracked if:
    Offline or Disconnectd
    Location Service Turned Off
    Restored by person who stolen it.
    Battery Dead
    Running below iOS 6 (ei. iOS 5.1.1)
    Change passwords used on that iDevice. Report to the police.
    Apple will do nothing without a court order.
    Reporting a lost or stolen Apple product
    iOS: How to find the serial number, IMEI, MEID, CDN, and ICCID number

  • HT204380 how do you know if someone is online

    I just want to know how someone will know that I'm online and available to talk using Facetime please

    You can't see if a contact can use FaceTime because you don't need to login in FaceTime to call her/him. An iPhone, iPad, iPod touch or Mac is permanently logged in, so you can call it without issues

  • How do you know if someone else is attempting access to your wireless network? (WRT54G)

    I searched adn tried the Linksys FAQ to no avail to get an answer to the subject question.
    Is there any way to verify who is actually using or trying to attempt use of your wireless network, if so, where do I locate and view this information?
    I just set up a wireless system so my wife could get access from her wireless equipped laptop, but I really see no area to verify who is actually using the wireless network or if some other outside source/person is attempting to get access.
    Any info on where, how and what to do to view this type of info would be greatly appreciated and if it can't be, shouldn't there be something added to the system that would allow one to view all users accessing their wireless system?
    Thank you,
    Clay Fugitte

    Tracking down who is using your wireless system is usually difficult or impossible.  The router only knows the MAC address of the connecting computer.  MAC addresses can be faked.  Even if you knew the MAC address of the person connecting, what can you do with that info?  Go around the neighborhood asking people "Is this your MAC address?"
    Instead of worrying about who is connecting to your wireless, you should simply set up wireless security.  This will keep intruders off your wireless network.  Then you don't need to worry about who is connecting.
    It sounds like you are running an unsecured wireless router.  When you run an unsecured wireless router, anyone within range can login and use your Internet connection. At a minumum, this means that they will be using your bandwidth. At worst, they could be uploading copyrighted music, sending spam email, distributing viruses, or downloading child pornography --- all from an account with your name on it!   So my advice is --- secure your wireless network.
    To set up wireless security, do the following:
    First of all, to setup wireless security,  you must use a computer that is wired to the router.
    Where to find the router settings: The router's login password is usually on one of the "Administration" pages. The other settings are all found in the "Wireless" section of the router's setup pages, located at 192.168.1.1
    First, give your router a unique SSID. Don't use "linksys".
    Make sure "SSID Broadcast" is set to "enabled".
    Next, leave the router at its default settings (except for the unique SSID), and then use your pc to connect wirelessly to the router. Test your wireless Internet connection and make sure it is working correctly. You must have a properly working wireless connection before setting up wireless security.
    To implement wireless security, you need to do one step at a time, then verify that you can still connect your wireless computer to the router.
    Next, encrypt your wireless system using the highest level of encryption that all of your wireless devices will support. Common encryption methods are:
    WEP - poor (see note below)
    WPA (sometimes called PSK, or WPA with TKIP) - good
    WPA2 (sometimes called PSK2, or WPA with AES) - best
    WPA and WPA2 sometimes come in versions of "personal" and "enterprise". Most home users should use "personal". Also, if you have a choice between AES and TKIP, and your wireless equipment is capable of both, choose AES. With any encryption method, you will need to supply a key (sometimes called a "password" ).
    The wireless devices (computers, printers, etc.) that you have will need to be set up with the SSID, encryption method, and key that matches what you entered in the router.
    Retest your system and verify that your wireless Internet connection is still working correctly.
    And don't forget to give your router a new login password.
    Picking Passwords (keys): You should never use a dictionary word as a password. If you use a dictionary word as a password, even WPA2 can be cracked in a few minutes. When you pick your login password and encryption key (or password or passphrase) you should use a random combination of capital letters, small letters, and numbers, but no spaces. A login password, should be 12 characters or more. WPA and WPA2 passwords should be at least 24 characters. Note: Your key, password, or passphrase must not have any spaces in it.
    Most home users should have their routers set so that "remote management" of the router is disabled. If you must have this option enabled, then your login password must be increased to a minumum of 24 random characters.
    One additional issue is that Windows XP requires a patch to run WPA2. Go to Microsoft Knowledge base, article ID=893357 and it will direct you to the patch.
    Sadly, the patch is not part of the automatic Windows XP updates, so lots of people are missing the patch.
    Note:
    WEP is no longer recommended. The FBI has demonstrated that WEP can be cracked in just a few minutes using software tools that are readily available over the Internet. Even a long random character password will not protect you with WEP. You should be using WPA or preferably WPA2 encryption.

  • How do you know if someone sent as family and friends or services and goods??

    Someone sent me 0.75 CENTS and i need to vertify if he sent as family and friends because he can chargeback if he sent as goods

    gringoguitarista wrote:
    I was on a public network and may have logged into some websites using user/password.  I also left my machine unattended for a short time.
    There's a person that's very suspicious hanging around, but I managed to take a picture of them. 
    How do I go about finding out if they managed to snag my passwords and/or install some sort of key logger on my machine?
    Sorry but I think the suspicious person in your scenario is the person taking pictures of strangers.
    Change your passwords if you are concerned.

  • How can you tell if someone is using your signal?

    I am wondering if any of my neighbors have hacked into my network. My security is turned on, my be I'm just paranoid.
    Thanks
    Tom

    Welcome,
    Run the Airport Utility, click on the base station and view Wireless clients. this will give you the MAC id of all connected clients.
    I also use iNet to list clients (available for OSX or iOS - I have both)
    If your router is wireless as well you'll need to use the admin pages to see if anyone is connecting to that.
    Regards,
    Shawn

  • How do you know if someone is hacking into your internet services

    I found several websites that I have never been to under settings in safari advanced settings. How did these get here and what can I do to stop it.

    Answered in the other thread you posted in.

  • How do you know if someone blocked you?

    Ok so my friend and I have been texting and then we just stopped and it wouldn't let me send a iMessage it always says message failed but when i iMessage my other friends it works and i think he blocked me did he? And how do i tell because when i text him it sends help me!

    Green simply means that the message was sent as an SMS, not iMessage. It has nothing to do with being blocked. Either the recipient has turned off iMessage or one or both of you does not have an active data connection.
    There is no way to tell if you have been blocked, short of asking the person.

  • How will you send SMS by using any  java technology

    how will you send SMS by using any java technology

    Wikipedia has an entry on that protocol...
    http://en.wikipedia.org/wiki/SMPP
    Written by a 12 year old and edited by a H.S. student with a C+ average (or vice versa), so you know it's accuracy has been verified and you can trust your career on it!
    OK, I don't know that is true and you probably guessed it, but I'm not a big fan of the Wikipedia concept, but that doesn't matter as long as you understand that the information contained within Wikipedia is not vetted in any traditional way. And yes, I do use Wikipedia occasionally as a resource but I do it knowing that accuracy of the information is always in question.
    Probably doesn't need discussing in this forum, but if you are curious, there was on interesting discussion about Wikipedia here:
    http://online.wsj.com/public/article/SB115756239753455284-zM_NmQpDWtRRSoHcPYcbQ6iq4H4_20061011.html?mod=tff_main_tff_top

  • How do you know which fields are mandatory while uploading PO using BAPI.

    How do you know which fields are mandatory while uploading PO data using BAPI. in a structure how do you know which fields are mandatory.
    and also, where how do you check that, the BAPI function module is executed.
    Thanks in Advance.
    Naveen.

    hi
    hope it will help you.
    Reward if help.
    REPORT zpo_bapi_purchord_tej.
    DATA DECLARATIONS *
    TYPE-POOLS slis.
    TYPES: BEGIN OF ty_table,
    v_legacy(8),
    vendor TYPE bapimepoheader-vendor,
    purch_org TYPE bapimepoheader-purch_org,
    pur_group TYPE bapimepoheader-pur_group,
    material TYPE bapimepoitem-material,
    quantity(13),
    delivery_date TYPE bapimeposchedule-delivery_date,
    net_price(23),
    plant TYPE bapimepoitem-plant,
    END OF ty_table.
    TYPES: BEGIN OF ty_alv,
    v_legs(8),
    success(10),
    v_legf(8),
    END OF ty_alv.
    TYPES: BEGIN OF ty_alv1,
    v_legf1(8),
    v_msg(500),
    END OF ty_alv1.
    *-----Work area declarations.
    DATA: x_table TYPE ty_table,
    x_header TYPE bapimepoheader,
    x_headerx TYPE bapimepoheaderx,
    x_item TYPE bapimepoitem,
    x_itemx TYPE bapimepoitemx,
    x_sched TYPE bapimeposchedule,
    x_schedx TYPE bapimeposchedulx,
    x_commatable(255),
    x_alv TYPE ty_alv,
    x_alv1 TYPE ty_alv1,
    x_alv2 TYPE ty_alv1.
    *-----Internal table declarations.
    DATA: it_table TYPE TABLE OF ty_table,
    it_commatable LIKE TABLE OF x_commatable,
    it_item TYPE TABLE OF bapimepoitem,
    it_itemx TYPE TABLE OF bapimepoitemx,
    it_sched TYPE TABLE OF bapimeposchedule,
    it_schedx TYPE TABLE OF bapimeposchedulx,
    it_alv TYPE TABLE OF ty_alv,
    it_alv1 TYPE TABLE OF ty_alv1,
    it_alv2 TYPE TABLE OF ty_alv1.
    DATA: po_number TYPE bapimepoheader-po_number,
    x_return TYPE bapiret2,
    it_return TYPE TABLE OF bapiret2,
    v_file TYPE string,
    v_temp(8),
    v_succsount TYPE i VALUE 0,
    v_failcount TYPE i VALUE 0,
    v_total TYPE i.
    DATA: v_temp1(5) TYPE n VALUE 0.
    DATA: x_event TYPE slis_t_event,
    x_fieldcat TYPE slis_t_fieldcat_alv,
    x_list_header TYPE slis_t_listheader,
    x_event1 LIKE LINE OF x_event,
    x_layout1 TYPE slis_layout_alv,
    x_variant1 TYPE disvariant,
    x_repid2 LIKE sy-repid.
    DATA : it_fieldcat TYPE TABLE OF slis_t_fieldcat_alv.
    SELECTION-SCREEN *
    SELECTION-SCREEN BEGIN OF BLOCK v_b1 WITH FRAME.
    *-----To fetch the flat file.
    PARAMETERS: p_file TYPE rlgrap-filename.
    SELECTION-SCREEN END OF BLOCK v_b1.
    AT SELECTION-SCREEN *
    AT SELECTION-SCREEN.
    IF p_file IS INITIAL.
    MESSAGE text-001 TYPE 'E'.
    ENDIF.
    AT SELECTION-SCREEN ON VALUE-REQUEST FOR p_file.
    *-----To use F4 help to find file path.
    CALL FUNCTION 'F4_FILENAME'
    EXPORTING
    program_name = syst-cprog
    dynpro_number = syst-dynnr
    IMPORTING
    file_name = p_file.
    v_file = p_file.
    START-OF-SELECTION *
    START-OF-SELECTION.
    PERFORM gui_upload.
    LOOP AT it_table INTO x_table.
    PERFORM header_details.
    v_temp = x_table-v_legacy.
    LOOP AT it_table INTO x_table WHERE v_legacy = v_temp.
    PERFORM lineitem.
    PERFORM schedule.
    ENDLOOP.
    DELETE it_table WHERE v_legacy = v_temp.
    PERFORM bapicall.
    MOVE po_number TO x_alv-success.
    APPEND x_alv TO it_alv.
    CLEAR x_alv.
    *-----To clear the item details in internal table after the operation for a header.
    REFRESH: it_item,
    it_itemx,
    it_sched,
    it_schedx.
    CLEAR: v_temp1.
    ENDLOOP.
    v_total = v_succsount + v_failcount.
    PERFORM display_alv.
    FORM GUI_UPLOAD *
    FORM gui_upload .
    CALL FUNCTION 'GUI_UPLOAD'
    EXPORTING
    filename = v_file
    filetype = 'ASC'
    TABLES
    data_tab = it_commatable
    EXCEPTIONS
    file_open_error = 1
    file_read_error = 2
    no_batch = 3
    gui_refuse_filetransfer = 4
    invalid_type = 5
    no_authority = 6
    unknown_error = 7
    bad_data_format = 8
    header_not_allowed = 9
    separator_not_allowed = 10
    header_too_long = 11
    unknown_dp_error = 12
    access_denied = 13
    dp_out_of_memory = 14
    disk_full = 15
    dp_timeout = 16
    OTHERS = 17
    IF sy-subrc = 0.
    *-----To fetch the comma seperated flat file into an internal table.
    LOOP AT it_commatable INTO x_commatable.
    IF x_commatable IS NOT INITIAL.
    SPLIT x_commatable AT ',' INTO
    x_table-v_legacy
    x_table-vendor
    x_table-purch_org
    x_table-pur_group
    x_table-material
    x_table-quantity
    x_table-delivery_date
    x_table-net_price
    x_table-plant.
    APPEND x_table TO it_table.
    ENDIF.
    CLEAR x_table.
    ENDLOOP.
    ENDIF.
    ENDFORM. " gui_upload
    FORM HEADER_DETAILS *
    FORM header_details .
    MOVE 'NB' TO x_header-doc_type.
    CALL FUNCTION 'CONVERSION_EXIT_ALPHA_INPUT'
    EXPORTING
    input = x_table-vendor
    IMPORTING
    output = x_table-vendor
    MOVE x_table-vendor TO x_header-vendor.
    MOVE x_table-purch_org TO x_header-purch_org.
    MOVE x_table-pur_group TO x_header-pur_group.
    x_headerx-doc_type = 'X'.
    x_headerx-vendor = 'X'.
    x_headerx-purch_org = 'X'.
    x_headerx-pur_group = 'X'.
    ENDFORM. " header_details
    FORM LINEITEM *
    FORM lineitem .
    v_temp1 = v_temp1 + 10.
    CALL FUNCTION 'CONVERSION_EXIT_ALPHA_INPUT'
    EXPORTING
    input = v_temp1
    IMPORTING
    output = v_temp1.
    MOVE v_temp1 TO x_item-po_item.
    CALL FUNCTION 'CONVERSION_EXIT_ALPHA_INPUT'
    EXPORTING
    input = x_table-material
    IMPORTING
    output = x_table-material.
    MOVE x_table-material TO x_item-material.
    MOVE x_table-quantity TO x_item-quantity.
    MOVE x_table-net_price TO x_item-net_price.
    MOVE x_table-plant TO x_item-plant.
    x_itemx-po_item = v_temp1.
    x_itemx-material = 'X'.
    x_itemx-quantity = 'X'.
    x_itemx-net_price = 'X'.
    x_itemx-plant = 'X'.
    APPEND x_item TO it_item.
    APPEND x_itemx TO it_itemx.
    CLEAR: x_item, x_itemx.
    ENDFORM. " lineitem1
    FORM SCHEDULE *
    FORM schedule .
    MOVE x_table-delivery_date TO x_sched-delivery_date.
    MOVE v_temp1 TO x_sched-po_item.
    x_schedx-delivery_date = 'X'.
    x_schedx-po_item = v_temp1.
    APPEND x_sched TO it_sched.
    APPEND x_schedx TO it_schedx.
    CLEAR: x_sched, x_schedx.
    ENDFORM. " schedule
    FORM BAPICALL *
    FORM bapicall .
    CALL FUNCTION 'BAPI_PO_CREATE1'
    EXPORTING
    poheader = x_header
    poheaderx = x_headerx
    IMPORTING
    exppurchaseorder = po_number
    TABLES
    return = it_return
    poitem = it_item
    poitemx = it_itemx
    poschedule = it_sched
    poschedulex = it_schedx.
    IF po_number IS NOT INITIAL.
    v_succsount = v_succsount + 1.
    MOVE x_table-v_legacy TO x_alv-v_legs.
    CALL FUNCTION 'BAPI_TRANSACTION_COMMIT'.
    ELSE.
    v_failcount = v_failcount + 1.
    MOVE x_table-v_legacy TO x_alv-v_legf.
    MOVE x_table-v_legacy TO x_alv1-v_legf1.
    LOOP AT it_return INTO x_return.
    IF x_alv1-v_msg IS INITIAL.
    MOVE x_return-message TO x_alv1-v_msg.
    ELSE.
    CONCATENATE x_alv1-v_msg x_return-message INTO x_alv1-v_msg SEPARATED BY space.
    ENDIF.
    ENDLOOP.
    APPEND x_alv1 TO it_alv1.
    CLEAR x_alv1.
    ENDIF.
    ENDFORM. " bapicall
    FORM DISPLAY_ALV *
    FORM display_alv .
    PERFORM x_list_header.
    PERFORM build_fieldcat CHANGING x_fieldcat.
    x_repid2 = sy-repid.
    x_event1-name = 'TOP_OF_PAGE'.
    x_event1-form = 'TOP_OF_PAGE'.
    APPEND x_event1 TO x_event.
    CALL FUNCTION 'REUSE_ALV_GRID_DISPLAY'
    EXPORTING
    i_callback_program = x_repid2
    is_layout = x_layout1
    it_fieldcat = x_fieldcat
    i_callback_user_command = 'USER_COMMAND'
    i_callback_top_of_page = 'TOP_OF_PAGE'
    i_save = 'A'
    is_variant = x_variant1
    it_events = x_event
    TABLES
    t_outtab = it_alv
    EXCEPTIONS
    program_error = 1
    OTHERS = 2.
    IF sy-subrc <> 0.
    MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
    WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4.
    ENDIF.
    ENDFORM. " display_master_data
    FORM USER_COMMAND *
    FORM user_command USING ucomm LIKE sy-ucomm selfield
    TYPE slis_selfield.
    READ TABLE it_alv INTO x_alv INDEX selfield-tabindex.
    CLEAR : x_alv2,it_alv2[].
    LOOP AT it_alv1 INTO x_alv1 WHERE v_legf1 = x_alv-v_legf.
    x_alv2 = x_alv1.
    APPEND x_alv2 TO it_alv2 .
    ENDLOOP.
    DATA : it_fieldcat TYPE slis_t_fieldcat_alv.
    DATA : x3_fieldcat LIKE LINE OF it_fieldcat.
    CLEAR : x3_fieldcat,it_fieldcat[].
    CLEAR x3_fieldcat.
    x3_fieldcat-col_pos = '1'.
    x3_fieldcat-fieldname = 'V_LEGF1'.
    x3_fieldcat-reptext_ddic = text-111.
    x3_fieldcat-ref_tabname = 'IT_ALV2'.
    APPEND x3_fieldcat TO it_fieldcat.
    CLEAR x3_fieldcat.
    CLEAR x3_fieldcat.
    x3_fieldcat-col_pos = '1'.
    x3_fieldcat-fieldname = 'V_MSG'.
    x3_fieldcat-reptext_ddic = text-112.
    x3_fieldcat-ref_tabname = 'IT_ALV2'.
    APPEND x3_fieldcat TO it_fieldcat.
    CLEAR x3_fieldcat.
    x_layout1-colwidth_optimize = 'X'.
    x_layout1-zebra = 'X'.
    IF it_alv2[] IS NOT INITIAL.
    CALL FUNCTION 'REUSE_ALV_GRID_DISPLAY'
    EXPORTING
    i_callback_program = x_repid2
    is_layout = x_layout1
    it_fieldcat = it_fieldcat
    i_save = 'A'
    i_callback_top_of_page = 'TOP'
    is_variant = x_variant1
    it_events = x_event
    TABLES
    t_outtab = it_alv2
    EXCEPTIONS
    program_error = 1
    OTHERS = 2.
    ENDIF.
    ENDFORM.
    FORM USER_COMMAND *
    FORM top.
    CALL FUNCTION 'REUSE_ALV_COMMENTARY_WRITE'
    EXPORTING
    it_list_commentary = 'Commentry'.
    ENDFORM.
    FORM BUILD_FIELDCAT *
    FORM build_fieldcat CHANGING et_fieldcat TYPE slis_t_fieldcat_alv.
    DATA: x1_fieldcat TYPE slis_fieldcat_alv.
    CLEAR x1_fieldcat.
    x1_fieldcat-col_pos = '1'.
    x1_fieldcat-fieldname = 'V_LEGS'.
    x1_fieldcat-reptext_ddic = text-108.
    x1_fieldcat-ref_tabname = 'IT_ALV'.
    APPEND x1_fieldcat TO et_fieldcat.
    CLEAR x1_fieldcat.
    x1_fieldcat-col_pos = '2'.
    x1_fieldcat-fieldname = 'SUCCESS'.
    x1_fieldcat-key = 'X'.
    x1_fieldcat-reptext_ddic = text-109.
    x1_fieldcat-ref_tabname = 'IT_ALV'.
    APPEND x1_fieldcat TO et_fieldcat.
    CLEAR x1_fieldcat.
    x1_fieldcat-col_pos = '3'.
    x1_fieldcat-fieldname = 'V_LEGF'.
    x1_fieldcat-key = 'X'.
    x1_fieldcat-reptext_ddic = text-110.
    x1_fieldcat-ref_tabname = 'IT_ALV'.
    APPEND x1_fieldcat TO et_fieldcat.
    CLEAR x1_fieldcat.
    ENDFORM. " build_fieldcat
    FORM BUILD_LIST_HEADER *
    FORM x_list_header.
    DATA: x_list_header1 TYPE slis_listheader.
    *-----List Header: type H
    CLEAR x_list_header1 .
    x_list_header1-typ = 'H'.
    x_list_header1-info = text-105.
    APPEND x_list_header1 TO x_list_header.
    *-----List Key: type S
    x_list_header1-typ = 'S'.
    x_list_header1-key = text-106.
    x_list_header1-info = v_total.
    APPEND x_list_header1 TO x_list_header.
    *-----List Key: Type S
    CLEAR x_list_header1 .
    x_list_header1-typ = 'S'.
    x_list_header1-key = text-107.
    x_list_header1-info = v_succsount.
    APPEND x_list_header1 TO x_list_header.
    ENDFORM. " build_list_header
    FORM TOP_OF_PAGE *
    FORM top_of_page.
    CALL FUNCTION 'REUSE_ALV_COMMENTARY_WRITE'
    EXPORTING
    it_list_commentary = x_list_header.
    ENDFORM. " TOP_OF_PAGE

  • HT5243 How does one know if they use "java applets"? What do they do? How will I know if I need to 'disable the java web plug-in browser' if I do not use them? ( I'm not very literate in computer-speak.

    How does one know if they use "java applets"? What do they do? How will I know if I need to 'disable the java web plug-in browser' if I do not use them? (Obviously I'm not very literate in computer-speak.)

    Well, when you go to a web page a section of the web page will have a coffee cup picture where the java applet will run. The applet loads then runs. If you are not seeing this behavior then you are not using java. If it make you feel more comfortable then disable the browser java plugin. On my machine I have not disable java- but you
    may what to.

  • HT1918 how do you know what computers are authorized to use home share before i delete a computer

    how do you know what computers are authorzed to use an I tune account?

    Welcome to the Apple Community.
    There is no way to view a list of authorised computers. You can only tell a computer is authorised from that computer itself, from the store menu in iTunes.

  • I purchased the teacher and student lightroom 5. I put in my code and uploaded my evidence to show that I am a teacher. I am guessing it was sent through to someone. How do I know when I can use the software? I don't understand what to do next.

    I purchased the teacher and student lightroom 5. I put in my code and uploaded my evidence to show that I am a teacher. I am guessing it was sent through to someone. How do I know when I can use the software? I don't understand what to do next.

    Please refer below link for more information
    Education FAQ

Maybe you are looking for

  • User Defined Table Setting

    Hello Experts, I created the User Defined Table in the name of SR NO where i entered the Docment No in Code Field (System generated default field).When i add the Document Number serially when i saved the UDT table then my serial sequence has changed.

  • Jobs blocked by sleeping sessions in sql server

    After a disaster recovery and a recreation of transaction log, my requests made through the virtual machine manager console are blocked by sessions with sleeping status, The next requests are waiting for this session, anyone have any suggestions? Tha

  • DVD ROM not working with Windows 8.1...I need the driver please.

    My CD/DVD/BluRay Drive is not working since I upgraded my laptop to Windows 8.1.  I really need the driver as soon as possible.  I really need the DVD/CD Drive to work.  I spent so much money getting this laptop to where it needs to be.  I bought new

  • Firmware update fails

    I have a L7580 and the firmware ver is R2011NxNxcN0. The new download ver is R2011PxN.exe showing to be a later ver. I have tried to flash fw to new ver by network and usb connection. When flashing the printer fw should display (Firmware flashing wil

  • Updating results of a select stmt

    Hello gurus, Can anybody throw some light on the usage of the following update stmt, in terms of its perfomance ? "UPDATE (<SELECT stmt>) SET < column > = < value > WHERE < column > < condition >" In my case, the select stmt that I plan is use is a j